Analysis

  • max time kernel
    138s
  • max time network
    112s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 00:33

General

  • Target

    b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe

  • Size

    382KB

  • MD5

    b17abc086c7a06a60b540dc31b08e5c8

  • SHA1

    6903e71fd7249176004edccca3f3f5b004261332

  • SHA256

    42f9e355dc416d64bfd0ed36c2f11c5a7230d065dbcff37d1001e83a34ce9b64

  • SHA512

    3e4472ffa7468e4c1233a0ca7d9380633a8c70b2c43112bfa4a292e7f959c3260300bbfa2b7ca0a689d96a00c13896e7ab02fe1ba76b8306a3b2084f4d7e0f83

  • SSDEEP

    6144:gbXE9OiTGfhEClq9aIlue3933tbuR6t4t5queGoc0Rk8yXDZ/2BaTrMO3V:EU9XiuitIlq6Gtgu/B0mjXDMITrMO3V

Score
8/10

Malware Config

Signatures

  • Drops file in Drivers directory 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 11 IoCs
  • Drops file in Program Files directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 2 IoCs
  • Runs .reg file with regedit 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b17abc086c7a06a60b540dc31b08e5c8_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • Drops file in Program Files directory
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:2172
    • C:\Windows\SysWOW64\mspaint.exe
      "C:\Windows\system32\mspaint.exe" "C:\Program Files (x86)\ololo\3t.jpg" /ForceBootstrapPaint3D
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3228
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\ololo\test5.bat" "
      2⤵
      • Drops file in Drivers directory
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1796
      • C:\Windows\SysWOW64\regedit.exe
        regedit -s snapshot.reg
        3⤵
        • System Location Discovery: System Language Discovery
        • Runs .reg file with regedit
        PID:1088
    • C:\Program Files (x86)\ololo\i144.exe
      "C:\Program Files (x86)\ololo\i144.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      PID:2432
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc
    1⤵
    • Drops file in System32 directory
    • Drops file in Program Files directory
    PID:4272
  • C:\Windows\system32\OpenWith.exe
    C:\Windows\system32\OpenWith.exe -Embedding
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1176

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\ololo\3t.jpg

    Filesize

    28KB

    MD5

    d8b2648966f588f00e522dd5f638a0da

    SHA1

    57a09e39e7a2f6797db478f51c4d32985b0db6f1

    SHA256

    50c7fcbcdf65265ce9128d04770f29cb3458390e313bc6434b4abfba50876a74

    SHA512

    1fa22158c42e6c1caef7994c29097dcf892a966465c58248142c76112bf3b4e55bdd70a2d2600a4a4b34b71d773c40aa62eaa2e3f09e78c6510f9dda659af2a0

  • C:\Program Files (x86)\ololo\i144.exe

    Filesize

    149KB

    MD5

    c9a4571669fc07cb7424dac0f1476c1b

    SHA1

    d468842a1b4cc517213bdc596725b62c076fefbe

    SHA256

    16c5fb03fe264c0096cd6147625c8141540b5974628d71f70e0c9e46670dba3e

    SHA512

    08984a01cfa4a714b401ba98c301eff6839bb0c4bb04c20c56d75058d4e7e5425fc71aabe8e3a0a1c9f411ad8a95b9b40d37ee3407eaebb981bedd350626c4c6

  • C:\Program Files (x86)\ololo\p.txt

    Filesize

    4B

    MD5

    864b153879fd1b48a69b1696349100df

    SHA1

    7c2130011ab48a0997571f4af3c3534159031f04

    SHA256

    d5f0eb6a8671aec1295e01dcbae8b70bbdbece3bf94dac0271185ea19c9e2f78

    SHA512

    b8935dc2945b37a05d7867645c26cfe8c3fe30dd31bab487751f92a97935532913caedab74032e31600b858f20520952e13d9bc6776c9160f9efc077f0085088

  • C:\Program Files (x86)\ololo\test5.bat

    Filesize

    33KB

    MD5

    13b1f83b47424e923a88346092c04c08

    SHA1

    f8bfa87b127bfa20a36ecd4d71defc0272bb0698

    SHA256

    a87014b17f6c4289c7ecb163c7e34c147306579810f0e0727e1649337e1085c6

    SHA512

    9c12aa6a28927760bd0fda71a44792bc2ad3149557994b0997dbb4e180328240d9ceba21ffeaa9ca2287a9747dbd75da17a2dbbf01bdfe7ab23ec26c98e6332a

  • memory/2172-31-0x0000000000400000-0x0000000000449000-memory.dmp

    Filesize

    292KB

  • memory/2432-54-0x0000000000400000-0x000000000042C000-memory.dmp

    Filesize

    176KB

  • memory/4272-40-0x000001FE40360000-0x000001FE40370000-memory.dmp

    Filesize

    64KB

  • memory/4272-47-0x000001FE48650000-0x000001FE48651000-memory.dmp

    Filesize

    4KB

  • memory/4272-49-0x000001FE486D0000-0x000001FE486D1000-memory.dmp

    Filesize

    4KB

  • memory/4272-51-0x000001FE486D0000-0x000001FE486D1000-memory.dmp

    Filesize

    4KB

  • memory/4272-52-0x000001FE48760000-0x000001FE48761000-memory.dmp

    Filesize

    4KB

  • memory/4272-53-0x000001FE48760000-0x000001FE48761000-memory.dmp

    Filesize

    4KB

  • memory/4272-36-0x000001FE3F9C0000-0x000001FE3F9D0000-memory.dmp

    Filesize

    64KB

  • memory/4272-55-0x000001FE48770000-0x000001FE48771000-memory.dmp

    Filesize

    4KB

  • memory/4272-56-0x000001FE48770000-0x000001FE48771000-memory.dmp

    Filesize

    4KB